By using this site you agree to our use of cookies. Please refer to our privacy policy for more information.Close
  • 38%*
    Reduction in the cost of managing vulnerabilities and their impact
  • 30%*
    Reduction in the number of man-days required to manage a scaled up level of vulnerability management
*Source: Customer responses and GRC Journey Business Value Calculator

Threat and Vulnerability Management App

The MetricStream Threat and Vulnerability Management App enables effective management of IT security by proactively aggregating and correlating threats and vulnerabilities across information assets. The app integrates with multiple end-point IT security and infrastructure management tools and security intelligence feeds to identify and prioritize the risk exposure for IT assets. It also streamlines the remediation process.

The MetricStream Threat and Vulnerability Management App enables a systematic approach to identifying, prioritizing, and remediating information security threats and vulnerabilities in business critical information technology assets and applications.

Download Datasheet Business Value Calculator

Enabling High Performers

Responsive and personalized interface designed for threat and vulnerability management

Highly configurable to meet your specific threat and vulnerability requirements

Threat intelligence and insights for better decisions

Fast, lean, ready for the future

Features

Centralized Asset Repository

Consolidate IT assets into a common library leveraging out-of-the-box connectors with a Configuration Management Database (CMDB) such as BMC Atrium and ServiceNow. Map IT assets to business entities, threats, and vulnerabilities. Manage and view these relationships in the form of data explorer and data browser.

Vulnerability Consolidation and Prioritization

Import vulnerability data from multiple third-party vulnerability scanning tools such as QualysGuard and Nessus. Generate a combined risk rating across each asset’s vulnerability and business context. Prioritize the vulnerability remediation strategies based on the risk rating. Orchestrate the remediation process workflow using predefined templates and rules.

Subscription to Threat Feeds

Monitor the threat landscape, zero-day advisories, and threat bulletins. Subscribe to RSS or e-mail based threat alerts from leading industry source, and filter threat alerts based on the key words.

Issue Management and Remediation

Identity and document the issues arising from threat and vulnerability management. Define the vulnerability remediation rules to auto-detect vulnerability patterns among assets and to auto-trigger remediation of issues or incidents. Automatically route incidents from threat and vulnerability app into BMC Remedy and ServiceNow.

Prioritize and assign resources for investigation and remediation with an underlying workflow and collaboration engine. Define an action plan, and track the remediation process and issues to closure.

Threat and Vulnerability Monitoring

Generate real-time intelligence on threats and vulnerabilities through graphical dashboards and reports with drill-down capabilities. Gain a 360º view and continuously monitor your organization’s threat and vulnerability posture.

Learn More

Delivering Business Value

  • Accelerate decision-making with actionable intelligence on vulnerabilities and their remediation
  • Improve efficiency by correlating vulnerabilities with IT assets, and prioritizing remediation efforts based on the areas of highest criticality
  • Improve risk preparedness through an aggregated view of vulnerabilities across systems
  • Stay ahead of threats and vulnerabilities with early warning notifications and proactive remediation mechanisms
  • Gain agility through a flexible approach to threat and vulnerability remediation
Request a demo Download RFP Template Pricing Contact